Blame src/testcurl/https/test_tls_authentication.c

Packit 875988
/*
Packit 875988
 This file is part of libmicrohttpd
Packit 875988
 Copyright (C) 2007 Christian Grothoff
Packit 875988
Packit 875988
 libmicrohttpd is free software; you can redistribute it and/or modify
Packit 875988
 it under the terms of the GNU General Public License as published
Packit 875988
 by the Free Software Foundation; either version 2, or (at your
Packit 875988
 option) any later version.
Packit 875988
Packit 875988
 libmicrohttpd is distributed in the hope that it will be useful, but
Packit 875988
 WITHOUT ANY WARRANTY; without even the implied warranty of
Packit 875988
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
Packit 875988
 General Public License for more details.
Packit 875988
Packit 875988
 You should have received a copy of the GNU General Public License
Packit 875988
 along with libmicrohttpd; see the file COPYING.  If not, write to the
Packit 875988
 Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
Packit 875988
 Boston, MA 02110-1301, USA.
Packit 875988
 */
Packit 875988
Packit 875988
/**
Packit 875988
 * @file tls_authentication_test.c
Packit 875988
 * @brief  Testcase for libmicrohttpd HTTPS GET operations
Packit 875988
 * @author Sagie Amir
Packit 875988
 */
Packit 875988
Packit 875988
#include "platform.h"
Packit 875988
#include "microhttpd.h"
Packit 875988
#include <curl/curl.h>
Packit 875988
#include <limits.h>
Packit 875988
#include <sys/stat.h>
Packit 875988
#ifdef MHD_HTTPS_REQUIRE_GRYPT
Packit 875988
#include <gcrypt.h>
Packit 875988
#endif /* MHD_HTTPS_REQUIRE_GRYPT */
Packit 875988
#include "tls_test_common.h"
Packit 875988
Packit 875988
extern const char srv_signed_cert_pem[];
Packit 875988
extern const char srv_signed_key_pem[];
Packit 875988
Packit 875988
Packit 875988
Packit 875988
/* perform a HTTP GET request via SSL/TLS */
Packit 875988
static int
Packit 875988
test_secure_get (void * cls, char *cipher_suite, int proto_version)
Packit 875988
{
Packit 875988
  int ret;
Packit 875988
  struct MHD_Daemon *d;
Packit 875988
  int port;
Packit 875988
  (void)cls;    /* Unused. Silent compiler warning. */
Packit 875988
Packit 875988
  if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT))
Packit 875988
    port = 0;
Packit 875988
  else
Packit 875988
    port = 3070;
Packit 875988
Packit 875988
  d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS |
Packit 875988
                        MHD_USE_ERROR_LOG, port,
Packit 875988
                        NULL, NULL, &http_ahc, NULL,
Packit 875988
                        MHD_OPTION_HTTPS_MEM_KEY, srv_signed_key_pem,
Packit 875988
                        MHD_OPTION_HTTPS_MEM_CERT, srv_signed_cert_pem,
Packit 875988
                        MHD_OPTION_END);
Packit 875988
Packit 875988
  if (d == NULL)
Packit 875988
    {
Packit 875988
      fprintf (stderr, MHD_E_SERVER_INIT);
Packit 875988
      return -1;
Packit 875988
    }
Packit 875988
  if (0 == port)
Packit 875988
    {
Packit 875988
      const union MHD_DaemonInfo *dinfo;
Packit 875988
      dinfo = MHD_get_daemon_info (d, MHD_DAEMON_INFO_BIND_PORT);
Packit 875988
      if (NULL == dinfo || 0 == dinfo->port)
Packit 875988
        { MHD_stop_daemon (d); return -1; }
Packit 875988
      port = (int)dinfo->port;
Packit 875988
    }
Packit 875988
Packit 875988
  ret = test_daemon_get (NULL, cipher_suite, proto_version, port, 0);
Packit 875988
Packit 875988
  MHD_stop_daemon (d);
Packit 875988
  return ret;
Packit 875988
}
Packit 875988
Packit 875988
Packit 875988
int
Packit 875988
main (int argc, char *const *argv)
Packit 875988
{
Packit 875988
  unsigned int errorCount = 0;
Packit 875988
  char *aes256_sha = "AES256-SHA";
Packit 875988
  (void)argc; (void)argv;       /* Unused. Silent compiler warning. */
Packit 875988
Packit 875988
#ifdef MHD_HTTPS_REQUIRE_GRYPT
Packit 875988
  gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
Packit 875988
#ifdef GCRYCTL_INITIALIZATION_FINISHED
Packit 875988
  gcry_control (GCRYCTL_INITIALIZATION_FINISHED, 0);
Packit 875988
#endif
Packit 875988
#endif /* MHD_HTTPS_REQUIRE_GRYPT */
Packit 875988
  if (!testsuite_curl_global_init ())
Packit 875988
    return 99;
Packit 875988
  if (NULL == curl_version_info (CURLVERSION_NOW)->ssl_version)
Packit 875988
    {
Packit 875988
      fprintf (stderr, "Curl does not support SSL.  Cannot run the test.\n");
Packit 875988
      curl_global_cleanup ();
Packit 875988
      return 77;
Packit 875988
    }
Packit 875988
Packit 875988
  if (setup_ca_cert () == NULL)
Packit 875988
    {
Packit 875988
      fprintf (stderr, MHD_E_TEST_FILE_CREAT);
Packit 875988
      curl_global_cleanup ();
Packit 875988
      return 99;
Packit 875988
    }
Packit 875988
Packit 875988
  if (curl_uses_nss_ssl() == 0)
Packit 875988
    {
Packit 875988
      aes256_sha = "rsa_aes_256_sha";
Packit 875988
    }
Packit 875988
Packit 875988
  errorCount +=
Packit 875988
    test_secure_get (NULL, aes256_sha, CURL_SSLVERSION_TLSv1);
Packit 875988
Packit 875988
  print_test_result (errorCount, argv[0]);
Packit 875988
Packit 875988
  curl_global_cleanup ();
Packit 875988
  if (0 != remove (ca_cert_file_name))
Packit 875988
    fprintf (stderr,
Packit 875988
	     "Failed to remove `%s'\n",
Packit 875988
	     ca_cert_file_name);
Packit 875988
  return errorCount != 0 ? 1 : 0;
Packit 875988
}